|Publication number||US6128299 A|
|Application number||US 08/707,987|
|Publication date||Oct 3, 2000|
|Filing date||Aug 23, 1996|
|Priority date||Aug 23, 1996|
|Also published as||EP0929988A1, WO1998008356A1|
|Publication number||08707987, 707987, US 6128299 A, US 6128299A, US-A-6128299, US6128299 A, US6128299A|
|Inventors||David James Greaves|
|Original Assignee||Virata Ltd.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (18), Referenced by (5), Classifications (9), Legal Events (11)|
|External Links: USPTO, USPTO Assignment, Espacenet|
The present invention relates generally to data communication networks and, more particularly, to the connection of low-cost, simple peripherals to asynchronous transfer mode networks.
Asynchronous Transfer Mode ("ATM") is an emerging packet switching network technology designed to provide service for a wide variety of applications such as voice, video and data. Originally proposed for use in the Broadband Integrated Services Digital Network ("B-ISDN") by the International Telegraph and Telephone Consultative Committee ("CCITT"), now reorganized as the Telecommunications Standardization Sector of the International Telecommunication Union ("ITU-T"), ATM is presently moving beyond the wide area network setting into the private network arena as a platform for local area networks ("LANs") with multimedia capabilities. ATM is now well known in the art and is described in various references. E.g., Martin de Prycker, Asynchronous Transfer Mode: Solution for Broadband ISDN (2nd Ed., Ellis Horwood Ltd., West Sussex, England, 1993).
In an ATM network, as defined by the CCITT standards, information is carried in packets of fixed size, specified for B-ISDN as 53 bytes or octets, called cells. These cells are individually labelled by addressing information contained in the first 5 bytes (octets) of each cell. Although ATM evolved from Time Division Multiplexing concepts, cells from multiple sources are statistically multiplexed into a single transmission facility. Cells are identified by the contents of their headers rather than by their time position in the multiplexed stream. A single ATM transmission facility may carry hundreds of thousands of ATM cells per second originating from a multiplicity of sources and travelling to a multiplicity of destinations.
ATM is a connection-oriented technology. Rather than broadcasting cells onto a shared wire or fiber for all network members to receive, a specific routing path through the network, called a virtual circuit, is set up between two end nodes before any data is transmitted. Cells identified with a particular virtual circuit are delivered to only those nodes on that virtual circuit.
The backbone of an ATM network consists of switching devices capable of handling the high-speed ATM cell streams. The switching components of these devices, commonly referred to as the switch fabric, perform the switching function required to implement a virtual circuit by receiving ATM cells from an input port, analyzing the information in the header of the incoming cells in real-time, and routing them to the appropriate destination port.
The deterministic nature of ATM makes it ideally suited for carrying multimedia or other real-time information, creating the opportunity to interconnect a wide variety of devices or equipment which generate or employ such information. For instance, an array of video surveillance cameras or motion sensors in an office building could be interconnected via an ATM network to efficiently deliver video images and other data to a common security control point. Further applications consist of the control and monitoring of devices in a residential or commercial setting. An individual may wish to program and/or monitor a microwave, refrigerator, clock, climate control, VCR, coffee maker, alarms, or other devices from one location in the home or at a remote location. A computer, either in the home or at a remote location, could use information from such devices to compile and transmit a shopping list, call a service specialist for the repair of a malfunctioning device, alert police to a security breach, or simply inform the homeowner of anything unusual or interesting.
Unfortunately, the current interfaces required for connection to ATM networks make the use of these networks with such simple peripherals prohibitively expensive. The major problem lies with current ATM protocols which require that the switches and end stations support vast quantities of signalling and management software, including a base set consisting of Q.2931, SSCOP, and SNMP. For a large class of possible simple ATM devices, such as those described above, the memory and processors required to implement these protocols is more expensive than the sum of the cost of the actual data handling components. Conceivably, lightweight versions of these protocols could be developed which would reduce the processing power necessary to implement an ATM interface for a simple device. However, even these protocols would require a minimum of software support which would be too costly for a large class of applications. Indeed, many devices could not be cost-effectively integrated into an ATM network unless fully-hardware interfaces could be employed. Furthermore, even if the necessity for this software support could be eliminated, the buffering in current ATM interfaces, in itself, could be prohibitively expensive.
Therefore, there exists a need for a mechanism to connect a number of simple peripherals to an ATM network using low-cost interfaces. Such interfaces would permit these devices to transmit and receive standard ATM cells without significant buffering, and without need to support current ATM protocols.
The present invention is directed to a communication system for connecting lowcost, simple peripherals to an ATM network. The system comprises a plurality of these simple peripheral devices interconnected in series by a communication link. A switch connects the communication link to the ATM network, such that the communication link begins and terminates at the switch so as to form a ring. In this manner, cells transmitted by any of the plurality of peripheral devices are delivered to the switch and then further transmitted by the switch onto the ATM network. Specifically, each peripheral device comprises an input port for receiving data and an output port for transmitting data. The ATM switch comprises a duplex switch port having an input connection for receiving data and an output connection for transmitting data, where the output connection is connected to the input port of the first of the plurality of peripheral devices, each input port of the other peripheral devices is connected to the output port of the previous peripheral device, and the output port of the last peripheral device is connected to the input connection of the duplex switch port. Each of the plurality of peripheral devices transmits data received at its input port on its output port, so that data progresses around the communication link and is ultimately received at the switch.
In accordance with another aspect of the invention, a token cell is transmitted from the ATM switch onto the communication link, where it is received and forwarded by each of the plurality of peripheral devices, and ultimately returned to the switch. Each peripheral device transmits cells in response to the token cell. In one embodiment, each peripheral device may transmit a cell after transmitting the token cell and the existing chain of cells previously transmitted by other devices. In another embodiment, each peripheral device may transmit a cell immediately following the token cell, thereafter transmitting the existing cell chain.
In accordance with another aspect of the invention, the token cell is generated by a polling station. The polling station may be located at the ATM switch, but will most likely be a process running on a computer elsewhere in the ATM network connected to the ATM switch by one or more virtual channel connections.
In accordance with another aspect of the invention, the peripheral devices are addressed using address fields in the cell headers. Furthermore, these address fields are algebraically manipulated as they pass through each peripheral device, thereby permitting devices to be addressed by their relative positions along the communication link.
In this manner, low-cost, simple peripheral devices can be connected to an ATM network without need to support current ATM protocols.
A more complete understanding of the invention may be obtained by reading the following description in conjunction with the appended drawings in which like elements are labeled similar y and in which:
FIG. 1 is a diagram of an embodiment of a communication system constructed in accordance with the principles of the present invention;
FIG. 2A is a diagram of an ATM cell as defined by the CCITT;
FIG. 2B is a diagram of an ATM cell header at the User-Network Interface as defined by the CCITT;
FIG. 2C is a diagram of an ATM cell header at the Network-Network Interface as defined by the CCITT;
FIG. 3 (FIGS. 3A-3D) is an illustration of an example cell chain transmitted on a first embodiment of the communication system of FIG. 1 using an unslotted physical layer;
FIG. 4 (FIGS. 4A-4D) is an illustration of an example cell chain transmitted on a second embodiment of the communication system of FIG. 1 using an unslotted physical layer.
FIG. 5 (FIGS. 5A-5D) is an illustration of an example cell chain transmitted on a third embodiment of the communication system of FIG. 1 using a slotted physical layer; and
FIG. 6 (FIGS. 6A-6D) is an illustration of an example cell chain transmitted on a fourth embodiment of the communication system of FIG. 1 using a slotted physical layer.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be obvious, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known circuits, structures and techniques have not been shown in detail in order not to unnecessarily obscure the present invention.
Furthermore, although what is described herein is a mechanism for connecting lowcost, simple peripherals to an ATM network, it should be understood that the present invention is in no way limited in applicability to ATM networks as defined by the CCITT. Rather, one skilled in the art will recognize that the invention described herein may be employed in a wide variety of packet switching networks. For examples of some alternative networks, see de Prycker, pp. 50-58.
A basic block diagram of a communication system 100 constructed in accordance with the principles of the present invention is shown in FIG. 1. Communication system 100 comprises a duplex ATM switch port 110 connected to a plurality of simple peripherals or devices 120 interconnected in a ring structure by communication link 130. Each device 120 has an input port 122 and output port 124. Likewise, duplex ATM switch port 110 has output connection 114 and input connection 112. Output connection 114 is connected via communication link 130 to input port 122 of first device 120-1. Input ports 122 of each of the following devices 120 are connected via communication link 130 to output port 124 of previous device 120, and output port 124 of last device 120 on the ring, device 120-5 in FIG. 1, is connected to input connection 112 of switch port 110. Polling station 140 communicates with devices 120 through switch port 110 via ATM network 150.
The wiring of communication link 130 may be easily implemented using unshielded twisted pair cabling (UTP), such as the cabling employed in the ATM25.6 standard. Those of ordinary skill in the networking field will appreciate that a wide variety of cabling and physical media may be employed to achieve the network topology depicted in FIG. 1. However, it will be recognized that since one of the primary goals sought to be achieved by the present invention is the reduction of expense associated with networking arrays of simple devices, a low-cost physical medium should be chosen. The physical medium of the IBM 802.4 Token Ring standard is well-suited for this purpose.
Although not necessary to the invention, standard ATM cells are employed throughout the preferred embodiment of the present invention. Therefore, as an aid to understanding the invention, a description of a typical ATM cell is as follows. FIG. 2A shows the format of an ATM cell 200 as defined in CCITT Recommendation I.361. This format, adopted for use in B-ISDN and other wide area networks, specifies a cell of 53 bytes (octets): an information field or payload 210 of 48 bytes (octets) which contains the user information which is the object of the transmission and a cell header 220 of 5 bytes (octets).
Cell header 220, or simply "header", is used for transmitting a variety of control information regarding the instant cell. FIG. 2B shows the structure of this header at the User-Network Interface (UNI), that is the interface between an end-user device and an ATM switch. Here the header is made up of a Generic Flow Control (GFC) field 230 for specifying information which may be used to control traffic flow at the user-network interface, a VPI (virtual path identifier) 240, a VCI (virtual circuit identifier) 250, a payload type 260 which provides information regarding the type of information contained in the payload area 210 of the cell, a cell loss priority bit 270 for setting the priorities relating to the abandonment of the cell during overload conditions, and a Header Error Control field 280 which contains an error control check byte for the previous four bytes (octets) in header 220.
FIG. 2C shows the format of header 220 at the Network-to-Network Interface (NNI), the interface between network switches. This header structure is identical to the structure at the UNI except GFC 230 is replaced with four additional bits of VPI 240. ATM networks do not provide for flow control of the type which is implemented in some packet networks and ATM networks have no facility for storing cells over a long period of time. Therefore, inside an ATM network there is no need for generic flow control. Thus, within the NNI, GFC 230 may be eliminated in favor of an expanded VPI 240. For more information regarding standard ATM cell formats see de Prycker, pp. 124-28. One skilled in the art will recognize that the cell format described herein represents only one standard cell format and that alternative cell formats and sizes may be employed in conjunction with the present invention.
In order for switch port 110, and therefore polling station 140, to have full connectivity with each device 120 attached to communication system 100, devices 120 must pass on cells received on their respective input ports 122 to their output ports 124. As described in detail below, the present invention permits the devices to employ simple hardware forwarding of cells, which eliminates the need for costly first-in, first-out (FIFO) memories. However, FIFO memories may be utilized in alternate embodiments, also described below.
It will be recognized that an arbitrary number of devices 120 may be installed in communication system 100, with the theoretical maximum number depending on the addressing range available, as each device 120 must possess an unique address. If the eight bit VPI field 240 of a UNI format cell header 220 is used as the vehicle for addressing, this theoretical maximum will be 256. However, the accumulation of regenerative clock jitter through the transceivers at input ports 122 and output ports 124 of devices 120 creates a practical limitation on the number of devices 120 which may be placed in communication system 100. This phenomenon has been well-characterized with respect to the IBM 802.4 Token Ring standard. Thus, if 802.4 transceivers are used, as they are in the ATM25 standard, thirty-two (32) devices 120 is a sensible maximum design size. It will be recognized that those of ordinary skill in the art can readily calculate maximum desirable ring sizes for alternative physical layer implementations.
Communication along communication system 100 occurs in the following manner. A device 120 on communication system 100 will only transmit a cell on its output port 124 after receiving on its input port 122 a "token cell." The token cell is a standard ATM format cell containing some form of identifying information labelling it as a token cell. For example, the token cell may simply possess a VCI value outside the range used for addressing. Those of ordinary skill in the art will recognize that the token cell may be identified in an almost limitless number of ways, so long as it possesses a unique pattern which cannot be confused with a normal cell containing user data.
Token cells are generated by polling station 140. Polling station 140 may reside at ATM switch port 110, but in most implementations it will be a process running on a nonlocal computer maintaining one or more virtual channel connections with switch port 110 via ATM network 150. Polling station 140 periodically transmits a token cell onto ATM network 150 where it is routed to ATM switch port 110. Switch port 110 transmits the token cell onto communication link 130 from output connection 114. Of course, if polling station 140 is resident at switch port 110, the token cell will be transmitted directly onto communication link 130 without need to travel through ATM network 150.
All cells received by a device 120 on its input port 122 will be forwarded onto its output port 124. Therefore, after being transmitted onto communication link 130 by switch port 110 at output connection 114, the token cell makes a complete rotation through the loop of devices 120 and is again received by switch port 110, this time at input connection 112. At this point, the token cell may be discarded by switch port 110. Alternatively, the token cell may be returned to polling station 140 where it can be detected as a loop integrity indicator demonstrating the proper connectivity of communication system 100.
A device 120 may only transmit a cell when it has received the token cell on its input port 120. In one embodiment of the present invention, device 120 transmits by "tagging" a cell into the next free cell "slot" after the token cell. In this manner, after the token cell has passed through a series of transmitting devices 120, a chain of response cells will be created following the token cell, which will be received by switch port 110 at its input connection 112. It will be recognized that this embodiment is particularly suited for simple low-cost, hardware implementations of device 120, as no costly FIFO memories are required. Each device 120 simply retransmits the data it receives without buffering until the end of the current cell chain, whereupon it transmits its own cell.
Of course, physical layers, such as ATM25 or ATM100, which would typically be employed in conjunction with the present invention are non-slotted; therefore, special control characters are used to define the necessary cell slots. After transmitting the token cell, switch port 110 transmits a series of "idle" characters which represent the end of the cell chain. Each device 120 wishing to transmit searches for the first idle character after receipt of the token cell, while retransmitting the data on its output port 124. This character will represent the end of the current cell chain and thus, the next free cell slot. Upon detecting this idle character, device 120 converts it to a "start of cell" (SOC) character and begins transmitting its cell of data. Device 120 will complete its transmission by again appending a series of idle characters.
An SOC character is defined in the ATM25 and ATM100 standards. Likewise, an idle character is defined by the ATM100 standard and all data bytes 54 or further beyond the last SOC in the ATM25 standard are implicit idles. These definitions may be used in conjunction with the present invention. However, it will be recognized by those of ordinary skill in the art that any unique bit patterns which cannot occur within a proper ATM cell may be chosen as these characters.
It should be understood that device 120 must perform a "conversion" of the first idle character into a SOC character. Otherwise, its cell of data is likely to be overwritten by the next transmitting device 120. This conversion process requires that device 120 maintain at least a one-character buffer in its forwarding logic.
An example of this transmission method is depicted in FIG. 3, which represents the circulation of one token cell where devices 120-1, 120-3 and 120-4 have data to transmit. FIG. 3A shows the cell chain immediately after transmission of the token by switch port 110 at output connection 114. The state of the cell chain is shown in FIG. 3B after device 120-1 transmits its cell, in FIG. 3C after 120-3 transmits its cell, and in FIG. 3D after 120-4 transmits its cell. Note that an SOC character must precede the token cell as well.
In a second preferred embodiment, each device 120 stores the token cell and current appended cell chain into a FIFO buffer after receiving them at input port 122. After retransmitting the token cell at output port 124, device 120 transmits its own cell of data followed by the existing cell chain partially stored in the FIFO. In other words, in this embodiment communication system 100 acts as a register insertion ring where devices 120 always transmit their data cells immediately following the token cell. This approach is suited for use with currently existing network interfaces. No modification of interface hardware is required.
An example of this second transmission method is depicted in FIG. 4, which again represents the circulation of one token cell where devices 120-1, 120-3 and 120-4 have data to transmit. FIG. 4A shows the cell chain immediately after transmission of the token by switch port 110 at output connection 114. The state of the cell chain is shown in FIG. 4B after device 120-1 transmits its cell, in FIG. 4C after 120-3 transmits its cell, and in FIG. 4D after 120-4 transmits it cell. As illustrated in FIGS. 4B-4D, intervening idle characters between cells may be permitted in this embodiment without jeopardizing the integrity of the cell chain. The number of such idle characters should be kept small, however, as a string of idle characters can be used to detect the end of the cell chain.
The skilled artisan will recognize, however, that devices 120 employing each of the above transmission methods may be installed in communication system 100 simultaneously. Devices 120 employing the first method append cells to the end of the cell chain, as described above, whereas devices 120 utilizing the second method insert their cells immediately following the token cell.
Although the present invention would typically be used with unslotted physical media, slotted media, such as the ATM155 physical layer, can also be used. However, special control characters employed above to introduce a dynamic slot structure to an unslotted layer are not necessary when using slotted media.
FIG. 5 illustrates a third embodiment of the present invention which employs the transmission method of the above first embodiment on a slotted physical layer. Again, the illustration represents the circulation of one token cell where devices 120-1, 120-3, and 120-4 have data to transmit. FIG. 5A shows the cell chain immediately after transmission of the token cell by switch port 110 at output connection 114. The state of the cell chain is shown in FIG. 5B after device 120-1 transmits its cell, in FIG. 5C after 120-3 transmits its cell, and in FIG. 5D after 120-4 transmits its cell. As illustrated in FIG. 5, devices 120 with data to transmit simply transmit a cell in the first empty cell slot following the token cell.
FIG. 6 illustrates a fourth embodiment of the present invention which employs the FIFO buffering transmission method of the above second embodiment on a slotted physical layer. Again, the illustration represents the circulation of one token cell where devices 120-1, 120-3 and 120-4 have data to transmit. FIG. 6A shows the cell chain immediately after transmission of the token cell by switch port 110 at output connection 114. The state of the cell chain is shown in FIG. 6B after device 120-1 transmits its cell, in FIG. 6C after 120-3 transmits its cell, and FIG. 6D after 120-4 transmits its cell. As shown in FIG. 6D, devices 120 in this embodiment have some lassitude to delay transmitting, resulting in the interjection of an empty cell slot between data cells, without corrupting the cell chain.
Those of ordinary skill in the art will recognize that other transmission scenarios are possible. For instance, devices 120 employing FIFO buffers could transmit their cells before forwarding the token cell, rather than immediately following.
In all of the above embodiments, after the cell chain is received by switch port 110 at input connection 112, switch port 110 will transmit the cells to their intended destinations via ATM network 150. As the cells transmitted by devices 120 are standard ATM cells, they are treated within ATM network 150 as any other cell travelling on conventional virtual circuits through intermediate ATM switches. However, often devices 120 will comprise some array of sensors or other data collection equipment whose data must be transmitted to the same processor somewhere in the network, typically co-located with polling station 140. Therefore, bundling all of the cells onto a single virtual path for this part of their journey would be more efficient. Such a bundling can be achieved without effort where, as discussed below, a section of VCI 250 is used for addressing within the loop. If such is not the case, switches which can encapsulate and de-encapsulate virtual paths will be required. One such type of switch is the Virata™ ATM switch from Advanced Telecommunications Modules, Ltd., Cambridge, England.
After completion of this transmission cycle, polling station 140 may transmit another token cell to initiate another cycle. Those of ordinary skill in the art will recognize that polling station 140 must delay sending a token cell such time as may be required to provide for all envisaged transmissions in response to the last token cell. If the token cell is normally returned to polling station 140 then the simplest method would be to wait for return of the token cell before sending another. However, this mechanism would not efficiently employ the bandwidth available to communication system 100, so a more frequent transmission of token cells may sometimes be desirable. It should be noted that the source rate pacing function of most network interface cards can be employed to achieve proper distribution of token cells.
A number of mechanisms exist for determining the optimum frequency of transmission of token cells. For instance, polling station 140 may track the number of cells transmitted in response to token cells and increase or decrease the frequency of the transmission of token cells accordingly. Therefore, if few devices 120 are transmitting cells, the frequency of token cells may be increased by polling station 140. Alternatively, polling station 140 may assume a certain average of response cells, and set the frequency of the transmission of token cells accordingly.
It will be recognized by those skilled in the art that requiring the reception of a token cell in order to transmit data yields a form of "backpressure" flow control, as is typically found in conventional ring networks. In other words, a device 120 may not transmit a cell until the destination, here polling station 140, indicates that it is ready for data by sending a token cell.
As is apparent from the examples illustrated in FIGS. 3-6, a device 120 need not send data in response to the token cell. If a device 120 does not have data to send, it merely forwards the token cell on its output port 124, along with any data following behind the token cell.
Furthermore, although the above illustrations show devices 120 transmitting a single data cell in response to a token cell, communication system 100 could be implemented to permit devices 120 to send multiple cells consecutively in response to the token cell. The total number of cells a device 120 may transmit in response to a single token cell could be restricted by a system design policy or, alternatively, a dynamic algorithm could be employed which would guarantee that a device 120 does not consume an excessive amount of system bandwidth. Even advanced scheduling algorithms such as the Timed Token Protocol of FDDI could be implemented, though such algorithms may be prohibitively expensive for many typical implementations of communication system 100.
Devices 120 receive cells by examining the addresses of cells which pass through the ring and filtering those cells which they are interested in. Theoretically, cells intended for one or more devices 120 could be transmitted from any point in ATM network 150 to switch port 110, which would in turn place the cells onto communication link 130. However, in a typical implementation these cells will be transmitted by polling station 140 when needed, either periodically or occasionally. The skilled artisan will recognize that polling station 140 can create bandwidth for these cells simply by holding off transmission of the next token cell, although other known scheduling algorithms may be more suited for some implementations.
Addressing of devices 120 is accomplished by placing device addresses in either VPI 240 or VCI 250 in cell header 220. By using VPI 240 for device addressing, each device 120 can have access to its own virtual circuit space, including its own set of reserved VCCs (in the range 1 to 31). However, given the likely low-complexity of devices 120, many devices 120 would only need one or a few VCCs to exchange single cell messages using a custom ATM adaption layer (AAL). In this case, VCI 250 or a portion thereof could equally be used for device addressing. Therefore, in the following description the term `address` refers to those bits in cell header 220 that are significant in a particular implementation.
Devices 120 possessing built-in identifiers may be addressed by simply placing the identifier in the address portion of cell header 220. Devices 120 without such built-in identifiers may be addressed using one of a number of methods known to those skilled in the art. However, another method particularly useful in the present invention involves algebraic manipulation of cell headers 220. In this embodiment, all devices 120 receive and transmit cells on a fixed hardwired address (such as 128). As cells are forwarded through a device 120, the forwarding logic manipulates the cell headers and adds one to the address. Using this implementation, it will be recognized that a device 120 can be addressed explicitly by using as an address a number less than 128 by the position of device 120 along the chain. Received response cells are similarly distinguished by the increment their address has encountered when received at polling station 140. It will be recognized that, if this method is used, HEC 280 must be recalculated at each device 120. Of course, a device 120 may also respond to or transmit on a promiscuous address or set of addresses which are hardwired and not translated by the forwarding logic. One skilled in the art of networks would appreciate that other implementations of algebraic manipulation would be equally effective in identifying the correct origin and destination of cells in a network of devices without built-in identifiers.
The algebraic manipulation of cell headers 220 also provides a mechanism for detecting the number of devices 120 installed in communication system 100. For example, if a token cell is defined as any cell with an address in the range 192 to 255, and polling station 140 always transmits the token cell with address 192 (or, alternatively, that is the value after final header translation in ATM switch port 110), then polling station 140 may detect the loop length by examining the received token cell address after its passage through the loop.
In the absence of this capability, polling station 140 can crudely determine the length of the ring by measuring the time it takes for token cells to traverse the ring.
As should be apparent, the use of algebraic manipulation of cell headers to address a set of devices 120 connected in series is not restricted to the network configuration shown in FIG. 1, but may be employed in other configurations as well. Indeed, it can be implemented in any system connecting devices 120 in a daisy chain, including a chain which is an open ended bus-structure, rather than a ring. For example, a number of loudspeakers or other simple output devices could be interconnected in series in an open-ended daisy chain. Sound samples or other data can be transmitted by an ATM switch port at the beginning of the chain, with an address offset determining which loudspeaker they will be played on. Sound destined for all loudspeakers can be carried on an address which is received promiscuously by the devices and passed on without modification.
It should be understood that various modifications will be readily apparent to those skilled in the art without departing from the scope and spirit of the invention. Accordingly, it is not intended that the scope of the claims appended hereto be limited to the description set forth herein, but rather that the claims be construed as encompassing all the features of patentable novelty that reside in the present invention, including all features that would be treated as equivalents thereof by those skilled in the art to which this invention pertains.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US4380063 *||Jun 10, 1981||Apr 12, 1983||International Business Machines Corp.||Flow control mechanism for block switching nodes|
|US4549291 *||Sep 9, 1983||Oct 22, 1985||Renoulin Roger Jean||Hybrid local communication network, operating both in circuit and packet modes|
|US5041963 *||Dec 29, 1988||Aug 20, 1991||Intel Corporation||Local area network with an active star topology comprising ring controllers having ring monitor logic function|
|US5241635 *||Aug 21, 1989||Aug 31, 1993||Massachusetts Institute Of Technology||Tagged token data processing system with operand matching in activation frames|
|US5388097 *||Jun 29, 1993||Feb 7, 1995||International Business Machines Corporation||System and method for bandwidth reservation for multimedia traffic in communication networks|
|US5446726 *||Oct 20, 1993||Aug 29, 1995||Lsi Logic Corporation||Error detection and correction apparatus for an asynchronous transfer mode (ATM) network device|
|US5490140 *||Sep 30, 1994||Feb 6, 1996||International Business Machines Corporation||System and method for providing ATM support for frame relay DTEs with a terminal adapter|
|US5506847 *||Apr 26, 1994||Apr 9, 1996||Kabushiki Kaisha Toshiba||ATM-lan system using broadcast channel for transferring link setting and chaining requests|
|US5524000 *||Jul 8, 1993||Jun 4, 1996||Fujitsu Limited||Terminal unit and a terminal unit connecting method in ATM switching system|
|US5592622 *||May 10, 1995||Jan 7, 1997||3Com Corporation||Network intermediate system with message passing architecture|
|US5625625 *||Jul 7, 1995||Apr 29, 1997||Sun Microsystems, Inc.||Method and apparatus for partitioning data load and unload functions within an interface system for use with an asynchronous transfer mode system|
|US5654962 *||Aug 25, 1995||Aug 5, 1997||Lsi Logic Corporation||Error detection and correction method for an asynchronous transfer mode (ATM) network device|
|US5668811 *||Jun 7, 1995||Sep 16, 1997||National Semiconductor Corporation||Method of maintaining frame synchronization in a communication network|
|US5708659 *||Feb 16, 1995||Jan 13, 1998||Lsi Logic Corporation||Method for hashing in a packet network switching system|
|US5719862 *||May 14, 1996||Feb 17, 1998||Pericom Semiconductor Corp.||Packet-based dynamic de-skewing for network switch with local or central clock|
|US5802056 *||Jul 12, 1996||Sep 1, 1998||Bay Networks, Inc.||Configuration of virtual rings in a token ring local area network|
|EP0365864A2 *||Sep 28, 1989||May 2, 1990||International Business Machines Corporation||Design of a high speed packet switching node|
|EP0472380A1 *||Aug 16, 1991||Feb 26, 1992||Kabushiki Kaisha Toshiba||ATM broadband switching networks having access nodes connected by a ring|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US20050097196 *||Oct 3, 2003||May 5, 2005||Wronski Leszek D.||Network status messaging|
|US20060064489 *||Nov 28, 2003||Mar 23, 2006||Laszlo Hars||Method for limiting the number of network devices in a communication network|
|US20080059671 *||Aug 14, 2007||Mar 6, 2008||Sick Ag||Data transfer method in a daisy chain arrangement|
|DE102006040709A1 *||Aug 30, 2006||Mar 20, 2008||Sick Ag||Datenübertragungsverfahren in einer Daisy-Chain-Anordnung|
|DE102006040709B4 *||Aug 30, 2006||Aug 14, 2008||Sick Ag||Datenübertragungsverfahren in einer Daisy-Chain-Anordnung|
|U.S. Classification||370/395.1, 370/450, 370/452|
|International Classification||H04Q11/04, H04L12/56|
|Cooperative Classification||H04L2012/5614, H04Q11/0478, H04L2012/5612|
|Aug 23, 1996||AS||Assignment|
Owner name: ADVANCED TELECOMMUNICATIONS MODULES, LTD., UNITED
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GREAVES, DAVID J.;REEL/FRAME:008220/0544
Effective date: 19960806
|Jul 7, 1997||AS||Assignment|
Owner name: VENTURE LENDING, A DIVISION OF CUPERTINO NATIONAL
Free format text: SECURITY INTEREST;ASSIGNOR:ADVANCED TELECOMMUNICATIONS MODULES, LTD.;REEL/FRAME:008657/0135
Effective date: 19970624
|May 14, 1999||AS||Assignment|
Owner name: VIRATA LIMITED, UNITED KINGDOM
Free format text: CHANGE OF NAME;ASSIGNOR:ADVANCED TELECOMMUNICATIONS MODULES, LIMITED;REEL/FRAME:009971/0593
Effective date: 19980326
|Jan 13, 2000||AS||Assignment|
Owner name: ADVANCED TELECOMMUNICATIONS MODULES, LTD., CALIFOR
Free format text: RELEASE OF PATENT SECURITY INTEREST;ASSIGNOR:VENTURE LENDING, A DIVISION OF CUPERTINO NATIONAL BANK& TRUST;REEL/FRAME:010478/0811
Effective date: 19991004
|Aug 7, 2000||AS||Assignment|
Owner name: VENTRUE BANKING GROUP, A DIVISION OF CUPERTINO NAT
Free format text: COLLATERAL ASSIGNMENT, PATENT MORTGAGE AND SECURITY AGREEMENT;ASSIGNOR:VIRATA CORPORATION;REEL/FRAME:011019/0669
Effective date: 20000606
|Nov 13, 2000||AS||Assignment|
Owner name: VIRATA CORPORATION, CALIFORNIA
Free format text: RELEASE OF PATENT SECURITY;ASSIGNOR:VENTURE BANKING GROUP, A DIVISION OF CUPERTINO NATIONAL BANK;REEL/FRAME:011238/0063
Effective date: 20001030
|Mar 29, 2004||FPAY||Fee payment|
Year of fee payment: 4
|Nov 2, 2006||AS||Assignment|
Owner name: CONEXANT SYSTEMS, INC., NEW JERSEY
Free format text: MERGER;ASSIGNOR:VIRATA LIMITED;REEL/FRAME:018471/0358
Effective date: 20041217
|Apr 3, 2008||FPAY||Fee payment|
Year of fee payment: 8
|Jun 5, 2008||AS||Assignment|
Owner name: GLOBESPANVIRATA LIMITED, UNITED KINGDOM
Free format text: CHANGE OF NAME;ASSIGNOR:VIRATA LIMITED;REEL/FRAME:021050/0310
Effective date: 20020311
Owner name: CONEXANT SYSTEMS UK LIMITED, UNITED KINGDOM
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GLOBESPANVIRATA LIMITED;REEL/FRAME:021050/0374
Effective date: 20040731
|Apr 3, 2012||FPAY||Fee payment|
Year of fee payment: 12